Papers

Search results

    ConferenceTitleAuthor(s)
    USENIX Security '95Information Security Technology? Don't Rely on It. A Case Study in Social EngineeringIra S. Winkler, Brian Dealy
    USENIX Security '95A Simple Active Attack Against TCPLaurent Joncheray
    USENIX Security '95WAN-hacking with AutoHack: Auditing Security Behind the FirewallAlec Muffet
    USENIX Security '95Kerberos Security with Clocks AdriftDon Davis, Daniel E. Geer
    USENIX Security '95Design and Implementation of Modular Key Management Protocol and IP Secure Tunnel on AIXPau-Chen Cheng, Juan A. Garay, Amir Herzberg, Hugo Krawczyk
    USENIX Security '95Network Randomization Protocol: A Proactive Pseudo-Random GeneratorChee-Seng Chow, Amir Herzberg
    USENIX Security '95Implementing a Secure rlogin Environment: A Case Study of Using a Secure Network Layer ProtocolGene H. Kim, Hilarie Orman, Sean O'Malley
    USENIX Security '95STEL: Secure TELnetDavid Vincenzetti, Stefano Taino, Fabio Bolognesi
    USENIX Security '95Session-Layer EncryptionMatt Blaze, Steven M. Bellovin
    USENIX Security '95File-Based Network Collaboration SystemToshinari Takahashi, Atsushi Shimbo, Masao Murota
    USENIX Security '95Safe Use of X Window System Protocol Across a FirewallBrian L. Kahn
    USENIX Security '95An Architecture for Advanced Packet Filtering and Access PolicyAndrew Molitor
    USENIX Security '95A Domain and Type Enforcement UNIX PrototypeLee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat
    USENIX Security '95Providing Policy Control Over Object Operations in a Mach-Based SystemSpencer E. Minear
    USENIX Security '95Joining Security Realms: A Single Login for NetWare and KerberosWilliam A. Adamson, Jim Rees, Peter Honeyman
    USENIX Security '95Independent One-Time PasswordsAviel D. Rubin
    USENIX Security '95One-Time Passwords in Everything (OPIE): Experiences with Building and Using Strong AuthenticationDaniel L. McDonald, Randall J. Atkinson, Craig Metz, Kaman Sciences Corporation
    USENIX Security '95Improving the Trustworthiness of Evidence Derived from Security Trace FilesEnnio Pozzetti, Vidar Vetland
    USENIX Security '95Using the Domain Name System for System Break-insSteven M. Bellovin
    USENIX Security '95DNS and BIND Security IssuesPaul A. Vixie
    USENIX Security '95MIME Object Security Services: Issues in a Multi-User EnvironmentJames M. Galvin, Mark S. Feldman
    Second USENIX Symposium on Mobile and Location-Independent ComputingCluster-based Approach for Routing in Ad-Hoc NetworksP. Krishna, M. Chatterjee, N. H. Vaidya, D. K. Pradhan
    Second USENIX Symposium on Mobile and Location-Independent ComputingHandoff and System Support for Indirect TCP/IPAjay Bakre, B.R. Badrinath
    Second USENIX Symposium on Mobile and Location-Independent ComputingWireless Adapter Architecture for Mobile ComputingJohn Trotter, Mark Cravatts
    Second USENIX Symposium on Mobile and Location-Independent ComputingMCE: An Integrated Mobile Computing Environment and Simulation TestbedRamki Rajagopalan, S. Venkatesan, Sridhar Alagar

Pages